542 lines
25 KiB
Plaintext
542 lines
25 KiB
Plaintext
|
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
= =
|
|||
|
- WELCOME TO THE PREMIER ISSUE OF -
|
|||
|
= =
|
|||
|
- -=>PHANTASY<=- -
|
|||
|
= =
|
|||
|
- A MONTHLY PUBLICATIOM AND NEWSLETTER OF -
|
|||
|
= =
|
|||
|
- THE -
|
|||
|
= INTERNATIONAL =
|
|||
|
- INFORMATION -
|
|||
|
= RETREIVAL =
|
|||
|
- GUILD -
|
|||
|
= =
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Volume Number One,Issue Number One Dated 10/31/90
|
|||
|
|
|||
|
Table of Discontents:
|
|||
|
|
|||
|
[1] The IIRG meets the FBI (Part 1)
|
|||
|
|
|||
|
[2] What is The IIRG and why should I support it?
|
|||
|
|
|||
|
[3] PHANTASY NEWS
|
|||
|
|
|||
|
[4] Listing of PHANTASY Distribution Sites
|
|||
|
|
|||
|
|
|||
|
OFFICIAL DISLAIMER...
|
|||
|
|
|||
|
All information in PHANTASY is from USER contributed material
|
|||
|
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
|||
|
any liability from any damages of any type that reader or
|
|||
|
user of information contained within this newsletter may encounter
|
|||
|
from the use of said information.
|
|||
|
|
|||
|
PHANTASY is (C) 1990 by The IIRG
|
|||
|
IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982
|
|||
|
|
|||
|
|
|||
|
Editors Note- For Printing PHANTASY uses a 50 line
|
|||
|
page format by 80 Columns
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
THE INTERNATIONAL INFORMATION RETREIVAL GUILD MEETS THE FBI
|
|||
|
(PART ONE)
|
|||
|
|
|||
|
|
|||
|
The following is a translation of a tape of the IIRG's meeting with the
|
|||
|
Federal Bureau of Investigations. The IIRG attended this meeting with
|
|||
|
a local users group. Some portions have been deleted to protect the
|
|||
|
members of the groups Identity and some Handles have been changed
|
|||
|
to further protect those identities. Some handles are still correct
|
|||
|
as these members did not request anonymity.
|
|||
|
We would offer the date of this meeting but do not feel it is prudent
|
|||
|
as this would further risk some members to scrutiny.
|
|||
|
|
|||
|
EDITORS NOTE- Please do not scream about the translation of the
|
|||
|
FBI Agents portions. This is the way he actually
|
|||
|
talked and we have brought it directly to text-form.
|
|||
|
|
|||
|
|
|||
|
Following a introduction by the President of the Local Users Group
|
|||
|
this is the way the meeting proceeded.
|
|||
|
|
|||
|
|
|||
|
FBI AGENT- I have a lot of information here,but first I'd like to thank
|
|||
|
(DELETED) and the (DELETED) for inviting me here tonight.
|
|||
|
Its a chance to share some information and maybe give you all
|
|||
|
some insight of maybe what we do know and what we don't know,
|
|||
|
and maybe relate a couple of cases the FBI's been involved in.
|
|||
|
There are not a whole lot, the ahhh law that governs computer
|
|||
|
crime has only been on the books since 1984,I think ahhh that
|
|||
|
Connecticut is one of the first states to ahhh, have a computer
|
|||
|
oriented law,ahhh as (DELETED) mentioned my name is BILL
|
|||
|
ATKINSON and I'm a special agent with the FBI and I'm assigned
|
|||
|
with the Hartford resident angency.
|
|||
|
I have a background in law enforcement,I spent nine and a half
|
|||
|
in Washington D.C. on the police department and I've been with
|
|||
|
the FBI since 1984.
|
|||
|
I dont have a computer background and you'll know that,
|
|||
|
That after i get done and you ask me one question and it just
|
|||
|
wipes me out right there.
|
|||
|
|
|||
|
OLD TIMER- (ROBUST LAUGH)
|
|||
|
|
|||
|
FBI AGENT- The cases that our office has been involved in,They have used
|
|||
|
computer experts from Washington D.C.,out of the Washington
|
|||
|
field office.
|
|||
|
I think they have two,who are court certified computer experts
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 2-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
FBI AGENT- So that lets you know as far as law enforcemaent goes its a,
|
|||
|
It's a brand new ball game, Ahhh I know the case I'm gonna
|
|||
|
tell you about or one of them. They had a whole room full of
|
|||
|
disks, Whatever the big brown tapes are. They had a whole room
|
|||
|
full of them. They needed a computer expert just to figure out
|
|||
|
what the evidence was that the seized.
|
|||
|
|
|||
|
WHOLE ROOM- (LAUGHTER)
|
|||
|
|
|||
|
FBI AGENT- Computer crime,the way it looks. Is going to affect everyone a
|
|||
|
lot more than your common neighborhood bank robberies.
|
|||
|
They last forever and ever and once they're detected,the people
|
|||
|
who are involved in it really don't want to report it.
|
|||
|
And the costs of changing the policies that allowed it to
|
|||
|
happen are just astronomical. We can see that with the Pratt
|
|||
|
and Whitney,different segments of government contract bidding.
|
|||
|
It's just astronomical the amount of money that it costs the
|
|||
|
taxpayers. It probably could pay my salary for at least six
|
|||
|
months anyway.
|
|||
|
|
|||
|
OLD TIMER- (Extremely Sadistic laugh)
|
|||
|
|
|||
|
FBI AGENT- Maybe when I get done you'll see at least what the FBI is
|
|||
|
trying to do,I'll try to touch the motives that generates the
|
|||
|
computer crime and the problems that it creates, and the
|
|||
|
problem it creates for the people trying to solve the crimes.
|
|||
|
|
|||
|
First let me say that we are an asset that probably every
|
|||
|
segment of United States society can use the FBI.
|
|||
|
There are a lot of people who don't know just how helpful we
|
|||
|
can be. They think that if they call the FBI,they're gonna be
|
|||
|
recorded and theres gonna be a dossier opened on you
|
|||
|
immediatly.
|
|||
|
Some of the phone calls we get shold be recorded just for the
|
|||
|
pure craziness of them all.
|
|||
|
|
|||
|
But don't hesitate,that if on your job site or somewhere down
|
|||
|
the line you come across something that appears to be
|
|||
|
suspicious or just out of the ordinary.
|
|||
|
Or some information that will help one of the people in our
|
|||
|
office. We have accountants who work white collar crime,we've
|
|||
|
had a couple of guys who worked on the Pratt and Whitney,
|
|||
|
STANGER case,which I'll get into later,who keep pretty much in
|
|||
|
touch with the people in Washington as to whats going on.
|
|||
|
But theres always someone out there that has a new wrinkle,
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=--=-=-=-=-=-=-END PAGE 3-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
FBI AGENT- I'm sure theres a few people in this room,Whats the term?
|
|||
|
HACKERS, that come across things the rest of the country
|
|||
|
doesn't know is out there.
|
|||
|
And with Every crime,every computer crime,you probably have
|
|||
|
the Fraud By Wire Statutes that is violated and the
|
|||
|
Interstate Transportation of stolen property,bank fraud,
|
|||
|
embezzelment,and mail fraud.
|
|||
|
There all tied in,and where you might think where theres just
|
|||
|
a computer problem,it might go on and be a whole interstate
|
|||
|
system thats being worked,and it happens.
|
|||
|
It happened recently in Texas,we had some people along the
|
|||
|
whole SouthWest United States that was just being bounced from
|
|||
|
one system to another. It took them months and months to
|
|||
|
figure out and then they decided not to prosecute.
|
|||
|
So there might be something you'd like to give us or you
|
|||
|
might not want to get involved,or at least if you want to use
|
|||
|
us as a sounding board,feel free to do that.
|
|||
|
|
|||
|
I know one of the things the agent who gave me this
|
|||
|
information said "Tell them about a definition of computer
|
|||
|
crime" So I went back to my books,I went back to Quantico
|
|||
|
two years ago,and I remembered one of the instructers down
|
|||
|
there said "I'm gonna give you a definition"
|
|||
|
|
|||
|
So lets start out by saying,
|
|||
|
|
|||
|
Really Computer Crime isn't really Computer Crime
|
|||
|
It's just a crime where a Computer happened to be in the Room
|
|||
|
|
|||
|
With that,everyone looks like wheres this guy coming from?
|
|||
|
Nobodys gonna actully say the computer commited the crime!
|
|||
|
So we had figured this guy had punched one too many buttons
|
|||
|
along the way and had lost touch with reality.
|
|||
|
I don't know if you can consider the computer the criminal
|
|||
|
or the person programming the computer the criminal.
|
|||
|
Once the crime has been defined,if we're notified about one
|
|||
|
and determine whats been stolen or whats been altered or
|
|||
|
manipulated, We can pretty well tell who committed the crime.
|
|||
|
That parts the easy part.
|
|||
|
There will be instances where you know whats been done,and
|
|||
|
you know who did it. But as you are aware of,computer
|
|||
|
programs and manipulations you can do with computers,
|
|||
|
it's very difficult to prove a certain person commited the
|
|||
|
crime.
|
|||
|
|
|||
|
Thats where I guess the problem lies in this day and age
|
|||
|
Its not knowing whats been done or knowing who did it,
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=--=-=-=-=-END PAGE 4-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
FBI AGENT- Its being able to prove it.
|
|||
|
And what we know with these laws being on the books for
|
|||
|
two years,there is no case law and every time one of these
|
|||
|
cases goes to court its a whole new baliwick for the
|
|||
|
judge,the prosecuters,and the defense attornys.
|
|||
|
Theres no,NO precedent has been really set as to whats
|
|||
|
evidence,whats real evidence,are copies evidence?
|
|||
|
In federal court,copies can't be admitted as evidence.
|
|||
|
So a computer printout? Is the printout the evidence?
|
|||
|
Is the computer the evidence? Is the programmer the evidence?
|
|||
|
And every time you go to court in a different district
|
|||
|
you have a different opinion.
|
|||
|
|
|||
|
KNIGHTHACK- So if your gonna do it,Do it now?
|
|||
|
|
|||
|
FBI AGENT- Yeah,do it while theres still time to figure out what the
|
|||
|
solution is....By the way,Your name please??
|
|||
|
|
|||
|
WHOLE ROOM- (Laughter)
|
|||
|
|
|||
|
FBI AGENT-When are you going to commit this crime?
|
|||
|
|
|||
|
KNIGHTHACK- Tommorrow!
|
|||
|
|
|||
|
FBI AGENT- Thats true,thats what the whole problem is.
|
|||
|
They've been passed,all the laws have been passed by the
|
|||
|
legislators and haven't been interpeted yet by the judges
|
|||
|
What little case law there is can change with every
|
|||
|
different program that comes up,because as the computer
|
|||
|
gets more refined,So do the crimes.
|
|||
|
What was a murder yesterday,is still a murder tommorrow,
|
|||
|
But what was a computer crime today,wasn't yesterday,and
|
|||
|
probably won't be tommorrow.
|
|||
|
I'm sure you can all think up different things you'd like to
|
|||
|
do, or in your case (POINTING AT KNIGHTHACK),have done and a
|
|||
|
|
|||
|
WHOLE ROOM- (Laughter)
|
|||
|
|
|||
|
KNIGHTHACK- I'm leaving now.
|
|||
|
|
|||
|
FBI AGENT- Just the imagination,you can look at the different computer
|
|||
|
games,I have a case I'm trying to work on, COMPUTER PIRACY
|
|||
|
Just one of the computer boards themselves that are going into
|
|||
|
the games,and they say thats rather simple.
|
|||
|
Because you can look at a certain format and know the person,
|
|||
|
who put it together.
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 5-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
FBI AGENT- And he basically initials the work by the way he puts it
|
|||
|
together. But now if he looks at it and you look at it,
|
|||
|
you would all say "Yeah you can tell thats what was done"
|
|||
|
But if you give it to a jury to look at,that doesn't know
|
|||
|
input from output,they would have no idea who put this
|
|||
|
transistor here.
|
|||
|
|
|||
|
WHOLE ROOM- (Laughter)
|
|||
|
|
|||
|
FBI AGENT- Are transistors still used,I don't know
|
|||
|
|
|||
|
MERCENARY- AHHH, Not to often.
|
|||
|
|
|||
|
WHOLE ROOM- (Laughter)
|
|||
|
|
|||
|
FBI AGENT- So ahhh,thats the whole problem,another problem we have,
|
|||
|
I dont know if its as big a problem now as when,Oh I don't
|
|||
|
know you can tell me,with people under the ages of 17 and
|
|||
|
16 getting into different databanks and manipulating those
|
|||
|
systems or just passing information around on the BBS's or
|
|||
|
whatever.
|
|||
|
The ahhh. federal prosecution of anyone under the age of 17
|
|||
|
is preety well unheard of, You have to get a specific request
|
|||
|
from the Department of Justice and a United States Attorny
|
|||
|
is gonna want to prosecute the case. And it has to be clear
|
|||
|
to the FBI and everyone else and if it doesn't really happen
|
|||
|
on the state level,They'll prosecute from 16 and under,
|
|||
|
They say they will here in Connecticut.
|
|||
|
But then you look at the crimes themselves and you know whats
|
|||
|
been done. Just to get into the bank and pass the information
|
|||
|
Will that be determined to be a crime?
|
|||
|
Maybe it will,Maybe it won't.
|
|||
|
|
|||
|
One agent i know in our office that was working a local case
|
|||
|
involving an insurance company. Where a High-School student
|
|||
|
had gained access through getting initialy in the database
|
|||
|
and then he'd go to bed at night and programmed his computer
|
|||
|
to go through all the numbers and find the code, When he
|
|||
|
got up in the morning, Low and Behold,he was in this
|
|||
|
insurance companies database.
|
|||
|
Well when he did,he fooled around for a couple of months
|
|||
|
The Insurance company,(Whose name will go unmentioned),before
|
|||
|
you all go out and cancel your polocies tommorrow.
|
|||
|
He was in and out for about two months,and they got a trap on
|
|||
|
the call and placed him in East Hartford or Manchester area.
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 6-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
|
|||
|
FBI AGENT- and they really didn't know what to do with it,he really
|
|||
|
wasn't doing anything but they knew he was coming online,
|
|||
|
late at night and early in the morning. They were perplexed,
|
|||
|
How do we stop him,really who is he?
|
|||
|
Because all they really knew was it was coming back to a
|
|||
|
telephone in East Hartford or Manchester.
|
|||
|
Well I guess they got there answer in one short way,
|
|||
|
he put on a message one morning and lets see what did it say?
|
|||
|
It went something to this effect,
|
|||
|
|
|||
|
He identified all there customers,and all there insurance
|
|||
|
users and he wanted a corvette or he would notify all the
|
|||
|
users the system was unsafe and he had access to all there
|
|||
|
accounts.
|
|||
|
|
|||
|
Well I guess they sent him back a message,and they went
|
|||
|
back and forth till they narrowed down who they were
|
|||
|
dealing with through the telephone company with a trap on the
|
|||
|
line and they traced it to a specific phone.
|
|||
|
|
|||
|
Anonymous- He shold have waited till they went on strike.
|
|||
|
|
|||
|
Whole Room- (Laughter)
|
|||
|
|
|||
|
FBI AGENT- Then they delivered the corvette and he came to pick it up,
|
|||
|
and he was only 14 or 15 and couldn't have driven anyway
|
|||
|
But they said shame on you and don't do it again,he was
|
|||
|
scared
|
|||
|
|
|||
|
MERCENARY- A good little slap on the wrist.
|
|||
|
|
|||
|
FBI AGENT- And now he's probably 18 or whatever and shooting for a rolls
|
|||
|
|
|||
|
KNIGHTHACK- No, now he's probably in the FBI's Computer.
|
|||
|
|
|||
|
FBI AGENT- Yeah,thats probably right,now thatcase was easy,that was
|
|||
|
extortion, he made a demand,then said what he was going to do
|
|||
|
and he was going to try to hurt there business.
|
|||
|
So in that case,they had extortion and had he been over
|
|||
|
17 they could have prosecuted him easily.
|
|||
|
|
|||
|
ANONYMOUS- Almost more effective than a gun!
|
|||
|
|
|||
|
FBI AGENT- Yes, It really is when your dealing with the millions they're
|
|||
|
dealing with and the amount of loss they could under go.
|
|||
|
If they decided to go with the prosecution,that would have
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
|
|||
|
FBI AGENT- been easy. But since he was that age and they didn't even
|
|||
|
do that, Now had he done something less extreme or more
|
|||
|
extereme,whatever the case may be.
|
|||
|
What would they have done with him? Thats still the question.
|
|||
|
Theres never been a computer crime in Connecticut and thats
|
|||
|
one of the bolder statutes as far as computer crime goes.
|
|||
|
One of the problems investigators have encounterd when
|
|||
|
facing computer crime is just what I said,
|
|||
|
What laws have been violated,I know if a high-school hacker
|
|||
|
gains access to a database, Whats the worth?
|
|||
|
Thats what prosecuters look for. How much did he get?
|
|||
|
Can the penalty be equal or greater than what he obtained?
|
|||
|
Did the person really obtain anything?
|
|||
|
If he hurts you business or causes you to use a computer
|
|||
|
analyist to try to track him down?
|
|||
|
He's hurt the company but not made any monetary gain?
|
|||
|
Thats what they'll still be looking at until they finally put
|
|||
|
a few experts into an area,Computer experts like yourselves
|
|||
|
that say hey and become police officers or investigators
|
|||
|
and can attack the problem where it is,and it is a problem.
|
|||
|
Until they do that they'll have guys like me or other
|
|||
|
ex-policeman or accountants who will have to take the word of
|
|||
|
everybody else and basically hope and pray they guess
|
|||
|
correctly on how were gonna catch the persons doing it.
|
|||
|
I know theres gotta be all different kinds of ways to corrupt
|
|||
|
the system and one of the biggest problems,that movie,ahhh
|
|||
|
about the kid who got into..
|
|||
|
|
|||
|
KNIGHTHACK- Wargames?
|
|||
|
|
|||
|
FBI AGENT- Thats one of the biggest fears especially with the FBI
|
|||
|
going to computer files and computer finger-print systems.
|
|||
|
The fedreal government has all its pricing statistics and
|
|||
|
bids on computer also.
|
|||
|
So if you can imagine a 15 or 16 year old on his computer all
|
|||
|
night,imagine the professional criminal or the proffessional
|
|||
|
spy or whatever,he has his whole life,eight hours a day and
|
|||
|
he gets paid and if he wants to put in overtime thats a free
|
|||
|
shot. And if you have to figure, for every program written
|
|||
|
theres somebody who can figure it out,because someone had to
|
|||
|
put it in the computer.
|
|||
|
|
|||
|
ANONYMOUS- No system is 100 per cent foolproof. if somone wants to work
|
|||
|
hard and long enough,he can get in any system.
|
|||
|
|
|||
|
FBI AGENT- Yes,Right but what do you do when he gets in??
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 8-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
|
|||
|
That Ends Part one of: THE IIRG MEETS THE FBI
|
|||
|
Be sure to get next months issue for the conclusion.
|
|||
|
|
|||
|
|
|||
|
|=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=|
|
|||
|
| PHANTASY FEATURE ARTICLE TWO: |
|
|||
|
| |
|
|||
|
| THE |
|
|||
|
| INTERNATIONAL |
|
|||
|
| INFORMATION |
|
|||
|
| RETREIVAL |
|
|||
|
| GUILD |
|
|||
|
| |
|
|||
|
| What is it,and why should I support it |
|
|||
|
| |
|
|||
|
|=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
The International Information Retreival Guild is a group of hackers,
|
|||
|
who are still bonded together in the earliest traditions of the art.
|
|||
|
We ask for No money,No contributions and the only thing we've ever
|
|||
|
charged for, are the costs of disks or tapes.
|
|||
|
We believe that the Guild should be supported by its actions and that
|
|||
|
if individuals are happy with our performance, voluntary contributions
|
|||
|
will follow. We are once again happy to join the mainstream hacking
|
|||
|
community and look forward to communicating with the world once more.
|
|||
|
The IIRG has been almost silent for three years now,but several members
|
|||
|
after reviewing present conditions have reactivated the group.
|
|||
|
We hope those of you who do remember us,and those of you who would like
|
|||
|
to come to know us and communicate with us will do so.
|
|||
|
Listed at the end of this issue will be several BBS systems where we
|
|||
|
we can be contacted and where PHANTASY will be distributed.
|
|||
|
Since this issue has been a little rushed,and we have not had much time
|
|||
|
to prepare for our new resurgence more information will be forthcoming
|
|||
|
in following issues.
|
|||
|
We hope to bring you all the hacking and phreaking news possible
|
|||
|
as well as programming, and insider reports.
|
|||
|
Most of our former contacts with several larger computer companies
|
|||
|
are still in place and we hope to be bringing you there inside
|
|||
|
dirt as to whats going on.
|
|||
|
So enjoy our forthcoming issues and we hope to be hearing from you...
|
|||
|
|
|||
|
|
|||
|
The IIRG-1990
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=End Page 9=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PHANTASY NEWS......
|
|||
|
|
|||
|
|
|||
|
Well as we stated we've not had much time to prepare but here's
|
|||
|
what we do have for now...
|
|||
|
|
|||
|
Date-Line Nov 6th through 15th
|
|||
|
|
|||
|
Microsoft to hold free WINDOWS computing Seminars in the following
|
|||
|
cities on the following dates....
|
|||
|
|
|||
|
Nov 6-Hartford,Ct.-9am to 11:30am-Ramada Inn,Meriden,275 Research Pkwy
|
|||
|
Nov 8-Denver,CO-9am to 11:30am and 1:30pm to 4:00pm at the
|
|||
|
Westin Hotel Tabor Center,1672 Lawrence St.
|
|||
|
Nov 8-Dallas Texas-9am to 11:30am and 1:30pm to 4:00pm at the
|
|||
|
Southland Center Hotel,400 N. Olive St.
|
|||
|
Nov 13-Minneapolis,MN-9:00am to 11:30am and 1:30pm to 4:00pm at the
|
|||
|
Radisson Hotel Metrodome,615 Washington Ave S. E.
|
|||
|
Nov 15-Detroit,MI-9:00am to 11:30am and 1:30pm to 4:00pm at the
|
|||
|
Westin Hotel Detroit,Renaissance Center
|
|||
|
|
|||
|
Date-Line Nov 12th through January 9th,1991
|
|||
|
|
|||
|
VMS Systems Security V5 Seminars to be held at
|
|||
|
|
|||
|
Nov 12-14 Denver,Co at the Digital Training Center
|
|||
|
212-702-4300
|
|||
|
December 3-5 San Diego,CA at the Humphreys 1/2 Moon Inn
|
|||
|
619-224-3411
|
|||
|
January 7-9 Boston MA at the Bay Back Hilton
|
|||
|
617-236-1100
|
|||
|
|
|||
|
We hear the course fee is $995 and is 3 days long
|
|||
|
One of our members was able to get in for free by
|
|||
|
lurking around back in October and tells us the
|
|||
|
Seminar offers an:
|
|||
|
|
|||
|
1.Overview of System Security
|
|||
|
2.Security Threats discussion covering:
|
|||
|
(User-based attacks,Operating system penetration,trap doors,
|
|||
|
worms,viruses Trojans and Indirect Hacker attacks)
|
|||
|
3.Type of Security Controls
|
|||
|
4.Log in Controls
|
|||
|
5.Files and Other Protection
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 10-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.Security Implemenatation Methods
|
|||
|
7.Security Auditing
|
|||
|
8.VAXcluster Security
|
|||
|
|
|||
|
A listing of DEC's DECnet-Vax Network security seminars will
|
|||
|
be forthcoming in the next issue.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PHANTASY DISTRIBUTION SITES
|
|||
|
|
|||
|
This is the List of BBS's that will be carrying Phantasy as of
|
|||
|
October 31,1990...
|
|||
|
--------------------------------------------------------------------------
|
|||
|
The Rune Stone BBS
|
|||
|
IIRG NODE #1 203-485-0088
|
|||
|
1200/2400 Baud
|
|||
|
--------------------------------------------------------------------------
|
|||
|
Lightning Systems
|
|||
|
1200/2400 Baud 414-363-4282
|
|||
|
--------------------------------------------------------------------------
|
|||
|
Prismatic Sphere
|
|||
|
1200/2400 Baud 518-372-8045
|
|||
|
--------------------------------------------------------------------------
|
|||
|
Northeast Survival BBS
|
|||
|
1200/2400 Baud 216-442-0879
|
|||
|
--------------------------------------------------------------------------
|
|||
|
MiniHost BBS
|
|||
|
1200/2400 Baud 203-496-9183
|
|||
|
--------------------------------------------------------------------------
|
|||
|
If you would like your BBS to be a distributor of Phantasy
|
|||
|
Call The Rune Stone and State so in Feedback to Sysop
|
|||
|
|
|||
|
May Odin Guide Your way....
|
|||
|
The IIRG-10/90
|
|||
|
|
|||
|
|
|||
|
End This Issue.............
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|